Term
|
Definition
An access right is a right granted to a user for a particular entity instance. |
|
|
Term
|
Definition
A software program that delivers advertising content in a matter that is unexpected or unwanted by the user. |
|
|
Term
|
Definition
Part of TCP/IP for determining the MAC based on IP. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Security actions that ensure that data is accessible to authorized users. |
|
|
Term
|
Definition
An attacker that gains control of a system unknowingly to the user called a zombie. They then carry out attacks using multiple zombies. |
|
|
Term
|
Definition
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen. |
|
|
Term
|
Definition
A combination lock that uses buttons which must be pushed in the proper sequence to open the door. |
|
|
Term
|
Definition
An attack that targets vulnerabilities in client applications that interact with a compromised server or processes malicious data. |
|
|
Term
|
Definition
Adds a program to the OS that is a malicious copycat version of legitimate program. |
|
|
Term
|
Definition
A person that is hired to break into a computer and steal information. |
|
|
Term
|
Definition
Security actions that ensure only authorized parties can view information. |
|
|
Term
|
Definition
A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence. |
|
|
Term
|
Definition
Apart of layering security, diversity is to have multiple non redundant forms of security. |
|
|
Term
|
Definition
Domain name server. Resolves host names by their IP address. |
|
|
Term
|
Definition
A vulnerability in a system software, hardware. |
|
|
Term
|
Definition
Hardware or software that is designed to prevent malicious packets from entering or leaving a computer or network. |
|
|
Term
|
Definition
A cookie that is created from the website that is currently being view. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A computer located in an area with limited security loaded with software and data that appears to be real to trick attackers into revealing their techniques. |
|
|
Term
|
Definition
Stealing another persons personal info like SSN and using it to impersonate them for financial gain. |
|
|
Term
|
Definition
A security action that ensures that info is correct and no unauthorized person or software has altered the data. |
|
|
Term
|
Definition
Provides multiple lines of defense against attackers. |
|
|
Term
|
Definition
Limits access to data to reduce the risk of it being compromised. |
|
|
Term
|
Definition
An attack that lies dormant until an event triggers it. |
|
|
Term
|
Definition
A series of instructions that can be grouped together as a single command. |
|
|
Term
|
Definition
An attack that intercepts legit data and forges a fictitious response to the sender. |
|
|
Term
|
Definition
A device that monitors and controls two interlocking doors to a small room designed to separate secure and non-secure data. |
|
|
Term
|
Definition
Keeping system info secure from outside sources who don't need to know the info. |
|
|
Term
|
Definition
A website or email that claims to be legitimate and asks unsuspecting users for sensitive data to be used against them. |
|
|
Term
|
Definition
The action of hacking into telecommunications systems, esp. to obtain free calls. |
|
|
Term
|
Definition
An attack that exploits a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining. |
|
|
Term
|
Definition
A predetermined set of rules to fallow in certain situations. |
|
|
Term
|
Definition
A device that detects an emitted signal to id the owner. |
|
|
Term
|
Definition
Radio frequency id's read by proxy readers usually in id badges. |
|
|
Term
|
Definition
The likelihood that a threat agent will exploit the vulnerability. |
|
|
Term
|
Definition
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software. |
|
|
Term
|
Definition
Software that is a cumulative package of all security updates plus additional features. |
|
|
Term
|
Definition
A means of gathering information for an attack by relying on the weaknesses of individuals. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A general term used to describe software that is used to spy on users and gather info w/o consent, thus violating their privacy. |
|
|
Term
|
Definition
An attack that targets SQL servers by injecting commands to be manipulated by the db. |
|
|
Term
|
Definition
A cookie created by a 3rd party that is different from the primary website. |
|
|
Term
|
Definition
A type of action that has the potential to cause harm. |
|
|
Term
|
Definition
A person or agent that has the power to carry out a threat. |
|
|
Term
|
Definition
An exe advertised as performing one activity but actually does something else. |
|
|
Term
|
Definition
Code that reproduces itself. |
|
|
Term
|
Definition
A flaw or weakness that allows a threat agent to bypass security. |
|
|
Term
|
Definition
An app that takes advantage of a vulnerability in an app or OS in order to self replicate. |
|
|
Term
|
Definition
Attacks that exploit previously unknown vulnerabilities so victims have no time to prepare or defend against them. |
|
|